{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:19:01Z","timestamp":1725549541094},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.22","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T12:50:08Z","timestamp":1209387008000},"page":"123-132","source":"Crossref","is-referenced-by-count":1,"title":["SUDS: An Infrastructure for Creating Bug Detection Tools"],"prefix":"10.1109","author":[{"given":"Eric","family":"Larson","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/940112.940115"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/358557.358577"},{"key":"ref31","article-title":"A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities","author":"wagner","year":"2000","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1145\/566171.566186","article-title":"Efficient Instrumentation for Code Coverage Testing","author":"tikir","year":"2002","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194001000487"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"journal-title":"CodeSonar","year":"0","key":"ref11"},{"journal-title":"Code Surfer","year":"0","key":"ref12"},{"key":"ref13","article-title":"Purify: Fast Detection of Memory Leaks and Access Errors","author":"hastings","year":"1992","journal-title":"Proc USENIX Winter 1992 Conference"},{"key":"ref14","article-title":"Designing the McCAT Compiler Based on a Family of Structured Intermediate Representations","author":"hendren","year":"1992","journal-title":"Proceedings of the 5th International Workshop on Languages and Compilers for Parallel Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/325478.325519"},{"key":"ref16","article-title":"Backwards-compatible bounds checking for arrays and pointers in C programs","author":"jones","year":"1997","journal-title":"Proc of the 3rd International Workshop on Automated Debugging"},{"key":"ref17","article-title":"Statically Detecting Likely Buffer Overflow Vulnerabilities","author":"larochelle","year":"2001","journal-title":"Proceedings of the 2001 USENIX Security Symposium"},{"key":"ref18","article-title":"High Coverage Detection of Input-Related Security Faults","author":"larson","year":"2003","journal-title":"12th USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref28","article-title":"CUTE: A Concolic Unit Testing Engine for C","author":"sen","year":"2005","journal-title":"Proceedings of the Symposium on the Foundations of Software Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/503229.503230"},{"journal-title":"Pointer-intensive benchmark suite","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586142"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178260"},{"journal-title":"Checker","year":"0","key":"ref5"},{"journal-title":"cTooi","year":"0","key":"ref8"},{"key":"ref7","article-title":"Check 'n’ Crash: Combining Static Checking and Testing","author":"csnaller","year":"2005","journal-title":"Proceedings of the International Conference on Software Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349342"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235429"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45139-0_7","article-title":"Automatically Validating Temporal Safety Properties of Interfaces","author":"ball","year":"2001","journal-title":"Workshop on Model Checking of Software"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3190-6"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45937-5_16","article-title":"Cil: Intermediate Language and Tools for Analysis and Transformation of C Programs","author":"necula","year":"2002","journal-title":"International Conference on Compiler Construction"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060297"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)81042-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"journal-title":"Technical Report PS961-INS1","article-title":"Insure++: An Automatic Runtime Error Detection Tool","year":"0","key":"ref26"},{"key":"ref25","article-title":"Dynamic Taint Analysis for Automatic Detection, Analysis and Signature Generation of Exploits on Commodity Software","author":"newsome","year":"2005","journal-title":"Proceedings of the 12th Annual Network and Distributed System Security Symposium"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362904.pdf?arnumber=4362904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T15:47:58Z","timestamp":1557503278000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.22","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}